An Improper Check for Unusual or Exceptional Conditions vulnerability combined with Improper Handling of Exceptional Conditions in Juniper Networks Junos OS on QFX Series and PTX Series allows an unauthenticated network based malicious user to cause increased FPC CPU utilization by sending specific IP packets which are being VXLAN encapsulated leading to a partial Denial of Service (DoS). Continued receipted of these specific traffic will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS on QFX Series: All versions before 17.3R3-S11; 17.4 versions before 17.4R2-S13, 17.4R3-S4; 18.1 versions before 18.1R3-S12; 18.2 versions before 18.2R2-S8, 18.2R3-S7; 18.3 versions before 18.3R3-S4; 18.4 versions before 18.4R1-S8, 18.4R2-S7, 18.4R3-S7; 19.1 versions before 19.1R1-S6, 19.1R2-S2, 19.1R3-S4; 19.2 versions before 19.2R1-S6, 19.2R3-S2; 19.3 versions before 19.3R3-S1; 19.4 versions before 19.4R2-S3, 19.4R3-S1; 20.1 versions before 20.1R2, 20.1R3; 20.2 versions before 20.2R2, 20.2R3; 20.3 versions before 20.3R1-S1, 20.3R2. Juniper Networks Junos OS on PTX Series: All versions before 18.4R3-S9; 19.1 versions before 19.1R3-S6; 19.2 versions before 19.2R1-S7, 19.2R3-S3; 19.3 versions before 19.3R2-S6, 19.3R3-S3; 19.4 versions before 19.4R1-S4, 19.4R3-S5; 20.1 versions before 20.1R2-S2, 20.1R3; 20.2 versions before 20.2R3-S1; 20.3 versions before 20.3R2-S1, 20.3R3; 20.4 versions before 20.4R2-S1, 20.4R3; 21.1 versions before 21.1R1-S1, 21.1R2.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
juniper junos 17.3 |
||
juniper junos 17.4 |
||
juniper junos 18.1 |
||
juniper junos 17.3r3 |
||
juniper junos 18.2 |
||
juniper junos 18.3 |
||
juniper junos 18.4 |
||
juniper junos 19.1 |
||
juniper junos 19.2 |
||
juniper junos 19.3 |
||
juniper junos 19.4 |
||
juniper junos 20.1 |
||
juniper junos 17.3r3-s2 |
||
juniper junos 20.2 |
||
juniper junos 20.3 |
||
juniper junos 20.4 |
||
juniper junos 21.1 |